Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

Data strategies are established based on client-specific requirements and are used to control several aspects of RDC pricing. You can set up pricing data strategies in Reference Data Center in the Create New Data Strategy wizard. Here you can define the data strategy, specify the security criteria, select the field groups, apply enrichments and select validation rules.

To set up a pricing data strategy:

  1. In the Setup workspace, in the left navigation, click Data Strategies.
    You see the Data Strategies workspace with the list of available data strategies.
  2. Click Create New and then from the drop-down select Price.
    You see the Create New Data Strategy wizard. 

Define the Data Strategy

You can define a data strategy that governs a specific subset of securities, including source hierarchy rules and other information about compositing data for these securities.

To define the data strategy:

  1. From the Setup workspace, click Data Strategies in the left navigation.
    You see the Data Strategy workspace with the list of available data strategies.
  2. Click Create New.
    You see the Data Strategy Definition dialog box.
  3. In the ID text box, enter a unique identifier. If you leave this option blank, the system assigns a unique identifier.
  4. In the Name text box, enter a name for the data strategy.
  5. In the Description text box, optionally enter a description of the data strategy.
  6. The Data Type field defaults to Price.
  7. The Gold Copy field defaults to the composite source selected during setup.
  8. Click Advanced Options to view the Advanced Options dialog box. Select all that apply and then click Save. Options include: 

    OptionDescription
     Apply trade volume to source rule logic When active, this feature uses the validated source, price type and exchange that has the most volume instead of the highest in the hierarchy
     Month End Processing Only - Bypass WIP Process. This feature bypasses the posting prices to the PRICE_WP table when a price is composited.
     Use underlying Security's price. Don't create demandWhen activated, this assumes that the data strategy is leveraging a price from the underlying enrichment and does not create a demand for the parent holding.
     Create demand for specified effective date This feature creates vendor-level demand for both the submitted effective date and evaluated date rule on the price source hierarchies.
    This data strategy will override other data strategies when there is a conflict in result of the security criteria logic This designates this data strategy as the trumping data strategy in case of conflict.
     Include underlying securities when creating demand. This feature creates demand for any underlying securities when demand is submitted for the data strategy.
  9. Set the Enabled check box (default) to indicate the data strategy is enabled for use. Or, clear the check box to disable use.
  10. Click the Vendor Data Expiration drop down and optionally select a date rule to block stale vendor data from composite use.
  11. Click Next.
    You see the Data Strategies  page.

Specify the Security Criteria

In the Securities Criteria page you can define the security and/or holdings criteria.

To specify the security criteria:

  1. Click Define for Security Selection Criteria and use the Logic Builder to define the security filter that defines the subset of securities processed by the data strategy.
  2. To apply holdings criteria to the data strategy, click the Apply holdings criteria to this data strategy check box and then select an option from the  Entities, Source, and Date Rule drop-down lists.
  3. Click Define for Holdings Criteria and optionally use the Logic Builder to define the securities with holdings processed by the data strategy.
  4. Click Next.
    You see the Sources page.

Define the Sources

In the Sources page you can select a pre-defined source hierarchy rule.

  1. Select a rule from the Source Rule drop-down list.
    You see the source hierarchy rules displayed in the space below.
  2. Click Next.
    You see the Field Group page.

Select the Field Groups

In the Fields page you can select a field group that contains your intended composite field. RDC uses field groups which is the reason why a group is chosen even one there is only one composite field.

To select field groups for the data strategy:

  1. Select the Field Groups from the drop-down list.
    You see the field group details displayed in the space below.
  2. To require that a field group be Authorization Required, click the corresponding checkbox.
  3. Click Next.
    You see the Enrichments page.

Apply Enrichments

In the Enrichments page you can select pre-configured enrichments to be applied to the data strategy that you are creating.

  1. Select the Enrichment from the drop-down list.
  2. Select if the enrichment to be applied is an Overlay or Default.
  3. Click Next.
    You see the Validations page.

Apply Validations

In the Validations page you can select which type of validation rules to apply to your data strategy.

  1. Select the Validation Processing. Options include:
    –  Process using global validation rules only.
    –  Define specific validation rule
  2. If you selected to Define specificvalidation rules, then select Validation Rule from the drop-down list. 
  3. Click Save & Close.
    The data strategy has been added to the list of available data strategies in the workspace.


  • No labels